|Publication number||US5452431 A|
|Application number||US 07/945,756|
|Publication date||Sep 19, 1995|
|Filing date||Sep 16, 1992|
|Priority date||Oct 30, 1991|
|Also published as||DE69223920D1, DE69223920T2, EP0540095A1, EP0540095B1|
|Publication number||07945756, 945756, US 5452431 A, US 5452431A, US-A-5452431, US5452431 A, US5452431A|
|Original Assignee||U.S. Philips Corporation|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (9), Referenced by (133), Classifications (18), Legal Events (6)|
|External Links: USPTO, USPTO Assignment, Espacenet|
The present invention relates to a microcircuit for a chip card, comprising inter alia input/output access means, at least one memory which is programmable and accessible via an addressing space with consecutive addresses, an addressing control circuit for said programmable memory which dictates either an inhibition or a validation of write and/or read commands by comparison of the requested address with two limit values in respect of the beginning and the end of a particular address region, which limits are stored within the addressing control circuit, said circuit also comprising a priority authorization channel enabling temporary cancellation of said inhibition in predetermined, specific circumstances.
A microcircuit of this kind is notably known from the document FR 2 304 989, corresponding to U.S. Pat. No. 3,971,916.
The use of portable cards incorporating an electronic integrated circuit or "chip" is well known in the field of banking; also known is their high operational security. It is in fact almost impossible to access given data inscribed in protected regions of the microcircuit without destroying the latter. Moreover, an identification protocol involving a personal and secret code inscribed in a protected region of the microcircuit causes inhibition of any tentative use of the card if the identification conditions are not satisfied.
In the case of a bank card, the manufacturer of the card first produces cards which do not contain personalized information, after which secret data which personalize each card is written therein. The cards are subsequently protected by irreversible technological locking steps.
The personal identification codes are then sent to each user (clients of the bank) and, via a different route, the cards themselves are despatched to the bank which requests the clients to pick up the cards. This system offers a high security against tentative abuse.
It is to be noted that a chip card can be used for applications outside the banking field where the practical aspects of portability of the card and its security of use offer interesting possibilities.
It could be envisaged to develop a specific microcircuit for each particular application, but it is more economical and simpler to conceive microcircuits of a type which is sufficiently universal so that the circuit can subsequently be programmed for the relevant application.
In this respect security problems arise if the writing of the secret identification data and the functional data for the actual application is entrusted to an entity other than the manufacturer of the microcircuit.
A person having bad intentions who succeeds in acquiring "virgin" cards and who has also obtained knowledge on the inscription techniques for a given application could illegally create falsified cards by imitating the original data inscription technique.
Therefore, the entity issuing the card, not being the manufacturer of the microcircuit, may wish to load the data of its application itself, so as not to disclose its secrets to the manufacturer of the microcircuits.
These security problems are aggravated when the formation of "multi-application" cards of a universal type is envisaged, which cards are originally virgin-like and are to be successively loaded, in an arbitrary succession, with data and programs of different applications by issuing entities which are unrelated to one another. Therefore, the aim will be to achieve a dynamic allocation of the programmable memory in adequate security conditions.
The manufacturer of the microcircuits should be able to ensure a possibility for protection of several regions of the memory for which he does not yet know the individual limits so that each issuing entity could protect the region in which it has loaded its secret functional data against any reading or writing attempts stemming from another application, regardless of whether these attempts stem from a programming error induced by the entity having issued said other application or from illegal programming by a fraud. Notably, it would be illusionary to supply a plurality of entities, capable of loading various applications, with programming secrets relating to the loading of all applications and still hope that these secrets will never get into the hands of personnel having bad intentions. No solution can be envisaged in this direction, the more so because a fully authorized but malicious entity could issue an application containing a programming error leading to the destruction of data contained in an application which is not its own.
The invention relates specifically to a microcircuit for a chip card of the multi-application type in which a high security level is maintained despite the fact that the card is manufactured in a "virgin" state and that it can be loaded, in a random order, by entities issuing applications which are independent from one another. The desired microcircuit should somehow have at its disposal locks which are mobile but which cannot be violated either during loading or operation or by application of any signal to the input/output acces means.
Amongst other things, it is an object of the invention to provide a solution to this technical problem.
According to one aspect of the invention, a microcircuit for a chip card of the kind set forth is characterized by comprising a processor cum read-only memory containing functional routine that is exclusively accessible to the processor, said circuit comprising a read-write memory having a repertory region and an application region that are mutually exclusive, the repertory region accommodating storage of a table containing for each program of a plurality of mutually independent application programs a respective reference code as well as in lockable register means associated upper and lower limit address values of a contiguous address subspace of said application region exclusively allocated to said application program, said circuit comprising control means for under control of said upper and lower limit address values and associated reference code granting a memory access to the associated subspace but otherwise negating said access, and said circuit comprising a priority authorization channel enabling temporary cancellation of said negating exclusively through execution of said functional routine causing unlocking of said register means for one particular said application program, and said circuit comprising loading means for through execution of said functional routine loading said particular application program.
Thus, in the general case where an application program has already been loaded into the card and is called via the input/output access means, from among the functional routines, a standard protocol recognizes the actual use. Thereafter, another routine controls a search in the repertory table, the address limit values pertaining to the requested application program, identified in said table by its reference code, said values being loaded into the limit registers which are unlocked during this initial operation step.
The requested application program is subsequently initiated and at the same time the limit registers are locked so that write or read requests which would address the programmable memory outside the address region between the stored limit values will remain without effect, for example until the microcircuit is switched off. In fact, the priority authorization channel is thus closed again. Thus, an application program relates exclusively to the ability to read or write in the address region associated therewith and fixed during loading. The other application programs are protected against any tentative reading or writing.
As far as the loading of any new application program into the card is concerned, the security resulting from the absence of interference with other regions of the programmable memory is provided by similar means.
Any request made on the input/output access means for loading an application program is subject to a standard protocol in connection with a special functional routine contained in the read-only memory. The reference code of the application as well as the memory space required must be announced during this protocol. A specific functional routine serves to search in the repertory table the first address available in the application region (the address which follows the highest end address of the application programs already loaded or the first address of the application region when the card is in the virgin-like condition). The end address of the requested application is calculated on the basis of the memory space request previously announced. When this end address of the application is compatible with the memory space of the application region, the limit values of the beginning and end addresses as well as the application reference code are written into the repertory table and these limit values are loaded into the limit registers, via a predetermined and intangible functional routine in all circumstances.
During these steps, preceding the loading, the limit registers are unlocked and may remain so during the subsequent loading of the application program. Nevertheless, the desired security is preserved by the fact that the loading of the application program is performed under the control of the central unit and by way of a predetermined and reliable functional routine which excludes any modification of the contents of the limit registers.
Locking of these registers may also be realized under the control of programming just before loading.
Any tentative loading beyond the address limits established in advance will remain without effect. The loading operation can be completed, if deemed necessary, by a routine for verification of the loaded data, a verification of the signature, a parity check, etc., but such operations do not substantially increase the security of the operation of the microcircuit in accordance with the invention.
The priority authorization channel may be controlled in different ways by application of appropriate logic conditions and as a function of the execution of operation steps succeeding the activation of the microcircuit.
However, in a preferred embodiment of the invention, offering full security, the microcircuit is characterized in that it comprises a flip-flop which is set to a first state exclusively when the microcircuit is activated, after which it is set to a second state, opposing the first state, as soon as an instruction counter associated with the central unit contains an address value situated in the addressing space of the programmable memory, and in that said flip-flop supplies a locking/unlocking signal for controlling the locking of the limit registers and for controlling the priority authorization channel.
Because it is linked to the instruction counter, the locking/unlocking signal offers a means which cannot be violated by an application program in order to lock the limit registers and the priority authorization channel, even though the flip-flop inherently remains an element which is reversible in time.
Because the functional routines which serve to read and/or write in the repertory table are inscribed in the read-only memory, the instruction counter serves as a pointer for this memory so as to execute these routines step by step.
Therefore, it suffices to situate the execution of these routines in the operating steps preceding the execution of any program inscribed in the programmable memory. The priority authorization channel is still open for as long as routines executed under the control of the central unit are concerned. As soon as an address indicating the programmable memory is to be loaded into the instruction counter, the locking/unlocking signal will be immediately set to its state in which blocking takes place, thus locking the limit registers and inhibiting the access to the repertory table.
In practice this can be attractively realised in a microcircuit which is characterized in that the addressing control circuit comprises an OR-gate, referred to as a validation gate, whose output controls the transmission of write and read signals for the programmable memory, and in that a first input of said validation gate receives a signal resulting from the comparison of any address called with the content of the limit registers, and another input, via which the priority authorization takes place, receives a signal resulting from the logic product of the locking/unlocking signal and the output signal of an address decoder which recognizes the single addresses of the repertory region.
Until now it has been assumed that the addressing space of the programmable memory was protected in the stated conditions regarding the repertory region and the application region.
However, it may also be useful to create also a given region of the addressing space of the programmable memory which is freely accessible by any application program, for example for provisionally storing therein processing results or for transmitting of data from one application to another.
This facility can be readily obtained without affecting the security, by way of a slight modification of the previously defined addressing control circuit. Such an embodiment of a microcircuit in accordance with the invention is characterized in that a region which is referred to as a "public" region is also provided in the addressing space of the programmable memory, which region is distinct from the repertory region and the application region, and in that the addressing control circuit comprises a supplementary address decoder which recognizes the single addresses of the public region and which outputs a signal which is applied to a supplementary input of the validation OR-gate.
The invention will be described in detail hereinafter with reference to the accompanying drawings.
FIG. 1 shows a circuit diagram of a microcircuit in accordance with the invention,
FIG. 2 shows a block diagram of a part of the microcircuit which supplies a locking/unlocking signal, and
FIG. 3 diagrammatically shows the organization of a particular region of the programmable memory.
FIG. 1 shows the general circuit diagram of a microcircuit in accordance with the invention in simplified form.
For the sake of clarity, the elements in this Figure which do not relate directly to the invention have been omitted. The microcircuit comprises a central microprocessor unit 10, a random access memory 11, a read-only memory 12, a programmable memory 13, for example an EEPROM, as well as an addressing control circuit 14 for the programmable memory 13. The said elements are interconnected by way of a bus system 15 on which the addresses and the data are transported between the various elements. For the sake of simplicity, the bus system 15 is represented by a single connection, but use can also be made of a separate address bus and a separate data bus. As is common practice, the bus system 15 may also be a single bus on which the addresses and the data are time multiplexed. With the central unit 10 there are associated input/output access means 16 which are isolated from the system bus 15 so that they ensure controlled access by the central unit 10 to the sensitive regions of the microcircuit which contain data to be protected.
From the central unit 10 the addressing control circuit 14 receives a set of commands 20, the most essential of which are the write commands W, the read commands R and the erasure commands E when intended for the programmable memory 13.
The write and read commands for the random access memory 11 and the read commands for the read-only memory 12 are not shown for the sake of clarity of the Figure and also because they do not interfere with the invention. The commands W, R and E for the programmable memory 13 can be inhibited or validated by the addressing control circuit 14 in the circumstances to be described hereinafter. As in customary in practical microcontrollers, the read-only memory 12 and the programmable memory 13 form part of the same addressing system while the random access memory 11 is addressed in a manner which is exclusive and distinct from the addressing of the memories 12 and 13. In the addressing space of the programmable memory 13 there are defined a repertory region ZR and an application region ZA, which regions are separate from one another and are defined once and for all upon manufacture.
Initially, the regions ZR and ZA are empty. The microcircuit may be loaded with application programs which are independent of one another and in an order and at instants which are arbitrary. During the loading of said programs they will be successively written into distinct regions ZA1, . . . , ZAi, . . . , ZAn which adjoin one another and which progressively fill the application region ZA.
It is to be noted that each region ZAi of a given application may also contain data (other than the operating codes) which belong to the relevant application and/or memory locations intended to receive processing results. In accordance with the invention, the repertory zone ZR contains a repertory table in which the beginning and end addresses as well as a reference code of each of the application programs loaded into the application region are inscribed during the loading of said programs. Thus, an ith application program loaded into the region ZAi between the addresses ZAil and ZAih, being the beginning and the end of the application program i, has been loaded by running one of the functional routines contained in the ROM during which the addresses ZAil and ZAih have been determined in advance and loaded into the repertory table of the repertory region ZR, accompanied by a reference code of the application program i. The loading protocol mentioned utilizes one of said functional routines inscribed in an unalterable manner in the read-only memory 12.
The addressing control circuit 14 is controlled so as to inhibit the read commands (R), the write commands (W) and the erasure commands (E) for the programmable memory 13 for addresses which are situated outside the interval determined by the limit values of the beginning ZAil and the end ZAih of an application ZAi designated in advance on the input/output access means 15. To this end, the bus system 15 is subdivided from the input of the addressing control circuit 14 into a data bus 21 and an address bus 22. The data bus 21 is fed in parallel to two registers which can be locked and which are referred to as limit registers 25 and 26, respectively, in which the addresses of the beginning and the end of an application being processed can be stored and locked by means of a locking/unlocking signal (LOC) from a terminal 60. The address bus 22, inside the addressing control circuit 14, is connected in parallel to two comparators 28 and 29, respectively, which are associated with the limit registers 25 and 26. The comparator 28 supplies an authorization signal when the current address on the address bus 22 is higher than or equal to the beginning address stored in the limit register 25, while the comparator 29 supplies a second authorization signal when the current addess on the address bus 22 is lower than or equal to the end limit address of the application stored in the register 26. The two authorization signals appearing at the output of the comparators 28 and 29 are applied to the two inputs of an AND-gate 30 whose output supplies 31 an authorization signal when the current address presented on the address bus 22 is situated between the address limits stored in the registers 25 and 26. The authorization signal present at the output 31 of the gate 30 is applied, via an OR-gate 32 which is referred to as a validation gate, to one of the inputs of three AND-gates 35, 36, 37, the other input of each of which receives the read command (R), the write command (W) and the erasure command (E), respectively. Therefore, these commands are applied to the programmable memory 13 exclusively if the AND-gates 35, 36, 37 conduct, i.e. when the current address present on the address bus 22 is situated between is coincident with the address limits stored in the registers 25 and 26; these commands are inhibited if the current address is beyond said limit values.
The OR-gate 32 constitutes an element which has previously been referred to as a priority authorization channel because of the fact that it comprises a second input 40 which receives an authorization signal during a predetermined operating step which follows any activation of the microcircuit.
In order to realise said priority authorization channel, the locking/unlocking signal (LOC) is inverted by an inverter 41 and applied to one of the two inputs of an AND-gate 42. The other input of said AND-gate 42 receives the output signal of an address decoder 43 which recognizes exclusively the addresses of the repertory region (ZR) and which supplies the AND-gate 42 with an authorization signal when the current address presented on the address bus 22 is situated within the addressing space of the repertory region (ZR). The AND-gate 42 thus forms the logic product of the locking/unlocking signal (LOC) and the output signal of the address decoder 43 in order to supply a priority authorization signal to the input 40 of the validation gate 32. The address decoder 43 which recognizes exclusively addresses from the repertory region (ZR) of the programmable memory 13 may be of a very simple type when the number of octets of the repertory region (ZR) can be expressed as an integer power of two, such as a value of 256 octets or 512 octets etc. For example, the repertory region may have a beginning address expressed in hexadecimal form by the value 8000 and the address of the end of said region may be expressed by the hexadecimal address 80FF.
The microcircuit shown in FIG. 1 also comprises an optional facility in that a so-called "public" region ZP is provided in the addressing space of the programmable memory 13, which region is distinct from the repertory region ZR and the application region ZA and is situated, for example between the regions ZR and ZA and adjacent thereto. Because unconditional access exists to said public region ZP, the validation gate 32 comprises a third input 50 via which a validation signal is applied which originates from an address decoder 51 which is similar to the address decoder 43, except for the fact that it only recognizes exclusively the addresses of the public region ZP of the programmable memory 13.
As has already been mentioned, the locking/unlocking signal (LOC) is set to an unlocking state (LOC=0) during a predetermined operation step which follows any activation of the microcircuit. It can be generated by any suitable logic system enabling the authorization of the loading of the limit registers 25 and 26 and the unblocking of the AND-gate 42 so as to enable the writing and/or reading of the repertory table contained in the repertory region ZR.
In an embodiment of the invention which is particularly attractive in view of the high security offered, the locking/unlocking signal (LOC) is produced in combination with the contents of an instruction counter of a generally known type and associated with a central microprocessor unit.
This part of the microcircuit will now be described with reference to FIG. 2.
This Figure shows an instruction counter 55 which forms part of the central unit 10 and which enables the step-wise execution of functional routines contained in the read-only memory 12. This facility is conventional in all microcontrollers or microprocessors and, therefore, does not require a detailed description. The instruction counter 55 is connected to a decoder 56, 57 whose output triggers, via an OR-gate 66, a flip-flop 58, for example of the type RS, when the content of the instruction counter 55 exceeds a given address value which, in the present example has the hexadecimal limit value 7FFF. This address limit corresponds to the case where the lowest address of the programmable memory is expressed by the value 8000 in hexadecimal form. A functional routine, being conventional in the field of microcontrollers, resets a given number of registers to zero and in the present case applies a reset-to-zero signal to the flip-flop 58, i.e. to its reset-to-zero input 59. The flip-flop 58 ultimately applies the locking/unlocking signal (LOC) on the terminal 60, also shown in FIG. 1, to the input of the addressing control circuit 14.
At the end of an activation of the microcircuit, when the central unit 10 executes the functional routines contained in the read-only memory 12, the instruction counter 55 designates program addresses relating to this read-only memory and the flip-flop 58 supplies an unlocking signal (LOC=0). The repertory table may be read or written under the control of the central unit 10 and the limit registers 25, 26 may be loaded by this central unit. However, when an application program is called (so that the address contained in the instruction counter 55 necessarily exceeds the hexadecimal address 7FFF given as a limit in the present example), the flip-flop 58 is set to the opposite state and supplies a locking signal on the terminal 60 (LOC=1). The limit registers 25 as well as the priority authorization channel are nevertheless locked until the next deactivation of the microcircuit. It is thus demonstrated that this facility offers full security to ensure absence of interference between the various application programs that could be loaded into the application region ZA.
The OR-gate 66 also enables an alternative operation where the locking signal (LOG=1) may be formed by a specific routine contained in the ROM 12, that is to say even if the content of the counter has not yet exceeded the limit value 7FFF. The functional routine provided for this purpose makes the central unit 10 supply a command signal on a connection 67, which signal is applied to a second input of the OR-gate 66. A locking signal can thus be supplied by programming, which signal will subsist until the next resetting to zero. This facility even further increases the security during the loading of a new application program and during the execution of an application which utilizes only routines contained in the read-only memory 12 and whose region ZAi reserved in the programmable memory contains only data (and no operating code).
The possible organization of the repertory region ZR of the programmable memory 13 will be described in detail with reference to FIG. 3. FIG. 3 again relates to an example where the values are purely arbitrary and only serve to make the explanation clearer.
It is assumed that the repertory region of the programmable memory 13 commences at the hexadecimal address 8000 and ends at the address 80FF. In this region, having a volume of 256 octets, if desired, there may be provided a segment which is denoted by the reference ZID and which serves to receive identification data of the card, the proprietor of the card, and keys. Outside the identification region ZID there is situated the actual repertory table TR which starts at the address INI and which extends as far as the hexadecimal address 80FF. As is indicated in the Figure, the repertory table TR contains the successive inscriptions of a first loaded program whose reference code is referred to as "PR-APP-A", which has a length of 350 octets and whose hexadecimal address of the beginning of the program execution is equal to 8200, as well as the address of the beginning of the region, the address of the end of the region being equal to 835 D, followed by a program referenced "PR-APP-B" having a length of 250 octets and an address of the start of the program execution with the hexadecimal value 8365 for the beginning address of the region, 835E for the end address 8457, and finally a program which is denoted as "PR-APP-C" having a length of 180 octets, a start of program execution address having a hexadecimal value 8460 for the address of the beginning of the region, 8458 and for the end address the value 850C. Actually, the addresses for the beginning of the execution of the program, as indicated for this example, do not necessarily coincide with the beginning address of the region allocated to the same program, but are necessarily situated within said allocated region.
First the case will be described where an application program already loaded into the card is called via the input/output access means.
Any request for the execution of an application program is subject to a procedure which can be decomposed into five principal steps:
an initialization step which may include an identification procedure for the card and its user,
a procedure for requesting the application announced via the input/output means,
a search procedure in the repertory table TR in order to determine whether the requested application exists and, if affirmative, the loading of the data specific of the application in said table,
the loading of the limit registers,
and finally the actual execution of the requested application program.
As soon as the microcircuit is activated, the flip-flop 58 is reset to zero at the same time as a given number of registers, and notably also the instruction counter 55. After a recognition protocol, if any, utilizing the identification data contained in the identification segment ZID of the repertory region ZR, an application program, for example the program "PR-APP-B" is called.
Under the control of a predetermined routine, the central unit 10 performs a search in the repertory table TR so as to determine whether such an application program is present. In the affirmative case, the address values of the beginning and the end of this application program, being the hexadeximal addresses 835E and 8457, respectively, in the present example, are fetched from the repertory table TR and, still under the control of a predetermined routine, these limit values are loaded into the limit registers 25 and 26, respectively. The operation of the microcircuit has thus far utilized only routines situated in the read-only memory 12 so that the instruction counter has never exceeded the address limit designating the programmable memory 13, being an address higher than the hexadecimal value 7FFF in the present example. During the subsequent operating step, consisting of the execution of the program called, the instruction counter 55 is charged with the address of the beginning of the execution of the application program called, for example the hexadecimal address 8365. This induces a change of state of the tip-flop 58 and produces a locking signal (LOC=1 ) on the terminal 60. Under the influence of this signal, the limit registers 25 and 26 are locked and the priority authorization channel formed by the branch comprising the inverter 41, the AND-gate 42 and the input 40 of the validation gate 32, is blocked. Nevertheless, the write, read and erasure operations in the programmable memory can no longer be executed, except in the sole segment situated between the limits of the beginning and the end of the program called or in the public region ZP. This selective access continues until the microcircuit is deactivated. The write and read operations in the so-called public region ZP remain possible by way of the authorization signal present at the input 50 of the validation gate 32 and originating from the address decoder 51 which recognizes the addresses corresponding to said region ZP.
Hereinafter the operation of the microcircuit will be described for the case where an application program is to be loaded into the programmable memory 13. As soon as the microcircuit is activated, an initialization step is triggered which is essentially similar to that already described for the execution of an application program. During a second step, under the control of a predetermined functional routine, the reference code of the program to be loaded is announced on the inputs/outputs as well as the memory volume necessary for this program which is expressed, for example as a number of octets. During a third operating step, again under the control of a predetermined functional routine, a search is performed in the repertory table TR contained in the repertory region ZR in order to determine whether the requested program has already been loaded; if not, a search is made for the last limit address of the end of the program inscribed in the table. This address also corresponds to the highest occupied address of the region ZA, because the programs have been successively loaded at ascending addresses. In the present example it concerns the hexadecimal value 850C. The same functional routine determines on the one hand the directly subsequent address value, that is to say the hexadecimal address 850D which will serve as the limit value of the beginning of the new program to be loaded, and on the other hand calculates the prospective address of the end of the program to be loaded, taking into account the memory volume announced during the second step. During a fourth step, the central unit performs a test so as to determine whether the address of the end of the program thus calculated is compatible with the highest address of the application region ZA, after which, under the control of a predetermined routine, the limit values of the beginning and the end of the program thus determined are loaded into the limit registers 25 and 26. Because the central unit has thus far executed functional routines contained within the read-only memory 12, the instruction counter has not yet exceeded the limit of the address values concerning the programmable memory 13. Thus, the locking/unlocking signal is in its unlocking state (LOC=0), enabling the loading of the limit registers 25 and 26 as well as the reading of the repertory table by way of the priority authorization channel 41, 42 and 32. During a fifth step, under the control of a functional routine, the central unit 10 completes the repertory table of the repertory region ZR by inscribing, subsequent to the series of references already presented, the reference code, the limit values of the beginning and end addresses previously determined and concerning the application program being loaded, as well as the address of the start of execution of this program.
A subsequent, sixth operating step relates essentially to the loading of said program, which loading can be accomplished only within the limits fixed by the address values of the beginning and the end stored in the limit registers 25 and 26. During such loading, the limit registers 25 and 26 may not be locked (LOC=0), but said registers carry out the checking of the write operations in the same way as if they were locked. Security is nevertheless maintained because of the fact that loading is executed under the control of the central unit 10 by way of a functional routine which cannot be modified by a user. However, it is also possible to activate the flip-flop 58 by programming by means of a signal transmitted, via the connection 67, to the OR-gate 66. In this case the limit registers may be locked during the loading. Any tentative loading of an application program having a length exceeding the announced memory volume will remain ineffective because of the control exerted by the limit registers 25 and 26 and the AND-gate 30.
If desired, the step for loading the program may be followed by a verification of the loaded data, a final verification of the signature, a parity check, etc. A tentative loading of a program having a length exceeding the length announced can be readily detected because of the fact that the last data presented for loading are in fact not stored in the programmable memory so that a verification of this final data reveals the attempted abusive loading, being either accidental or fraudulent.
Referring to FIG. 1 again, an additional device for signalling an operation anomaly will now be described. This additional device comprises an AND-gate 62 having two inputs, an OR-gate 63 having three inputs, and an inverter 64.
The input of the inverter 64 receives the output signal of the validation gate 32 and applies this signal, after inversion, to an input of the AND-gate 62.
The output of the OR-gate 63 is connected to the other input of the AND-gate 62 and its input receives the three control signals R, W E destined for the programmable memory 13, thus forming the logic sum of these control signals.
When one of these operations is requested, the signal at the output of the OR-gate 63 is high. At the same time, if none of the authorization conditions is satisfied, producing a low signal at the output of the OR-gate 32, the AND-gate 62 is activated and produces a signal at its output which is applied to the central unit 10, for example an interrupt signal (INT=1).
Thus, when an interruption is used, an anomaly in the operation and more particularly a non-authorized request for access to the programmable memory 13 will lead to an interruption in the operation of the microcircuit (non-maskable interruption) and, if desired, an alarm message can be produced on the user terminal for the card.
The signal INT formed in the case of an anomaly can be used to produce any desirable modification of the operation of the microcircuit: for example, invalidation of the program having produced the anomaly, total invalidation of the operation of the card.
An attractive aspect of the invention is that only the functional routines written in the read-only memory must be extensively tested and approved, while the application programs may be created by various entities under their own responsibility and without under risk of interference between the applications.
The microcircuit in accordance with the invention thus offers perfect security for the use of a multi-application chip card.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US3573855 *||Dec 31, 1968||Apr 6, 1971||Texas Instruments Inc||Computer memory protection|
|US3742458 *||Sep 10, 1971||Jun 26, 1973||Yokogawa Electric Works Ltd||Memory protection system providing fixed, conditional and free memory portions corresponding to ranges of memory address numbers|
|US3971916 *||Mar 21, 1975||Jul 27, 1976||Societe Internationale||Methods of data storage and data storage systems|
|US5003594 *||Dec 20, 1989||Mar 26, 1991||Hitachi Maxell, Ltd.||Portable electronic device and its secret information collation method|
|US5161256 *||Aug 24, 1989||Nov 3, 1992||Kabushiki Kaisha Toshiba||Method and system for allocating file area in memory area of ic card|
|US5276903 *||Jan 19, 1993||Jan 4, 1994||Hatachi Maxell, Ltd.||Method for rewriting partial program data in an IC card and apparatus therefor|
|US5285200 *||Jan 14, 1993||Feb 8, 1994||Kabushiki Kaisha Toshiba||Portable electronic device and a method for processing data therefore|
|US5325496 *||Dec 24, 1991||Jun 28, 1994||Intel Corporation||Selectable pointer validation in a computer system|
|WO1992013322A1 *||Jan 16, 1992||Aug 6, 1992||Gemplus Card International||Secured method for loading a plurality of applications into a microprocessor memory card|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US5678027 *||Dec 8, 1994||Oct 14, 1997||Siemens Aktiengesellschaft||Method for preventing unauthorized modification of data in a device with a nonvolatile memory|
|US5727005 *||Aug 31, 1994||Mar 10, 1998||Le; Chinh H.||Integrated circuit microprocessor with programmable memory access interface types|
|US5754762 *||Jan 13, 1997||May 19, 1998||Kuo; Chih-Cheng||Secure multiple application IC card using interrupt instruction issued by operating system or application program to control operation flag that determines the operational mode of bi-modal CPU|
|US5809544 *||Oct 15, 1996||Sep 15, 1998||Motorola, Inc.||Microcontroller which limits access to internal memory|
|US5894550 *||Jan 16, 1997||Apr 13, 1999||Soliac||Method of implementing a secure program in a microprocessor card, and a microprocessor card including a secure program|
|US5924124 *||May 27, 1997||Jul 13, 1999||Philips Electronics North America Corporation||Software programmable bus disable system|
|US5963980 *||Dec 6, 1994||Oct 5, 1999||Gemplus Card International||Microprocessor-based memory card that limits memory accesses by application programs and method of operation|
|US6002619 *||Dec 19, 1997||Dec 14, 1999||Sgs-Thomson Microelectornics S.A.||Memory with read protected zones|
|US6003134 *||Dec 30, 1997||Dec 14, 1999||Kuo; Chih-Cheng||Secure open smart card architecture|
|US6009453 *||Mar 27, 1996||Dec 28, 1999||Kabushiki Kaisha Toshiba||Multi-program execution controlling apparatus and method|
|US6034902 *||Mar 24, 1997||Mar 7, 2000||Siemens Aktiengesellschaft||Solid-state memory device|
|US6126078 *||Feb 19, 1997||Oct 3, 2000||Kaba Schliesssysteme Ag||Identification medium with passive electronic data carrier storing a plurality of independent applications|
|US6164549||May 11, 1998||Dec 26, 2000||Mondex International Limited||IC card with shell feature|
|US6220510||Apr 23, 1998||Apr 24, 2001||Mondex International Limited||Multi-application IC card with delegation feature|
|US6230267||May 11, 1998||May 8, 2001||Mondex International Limited||IC card transportation key set|
|US6317832||May 12, 1998||Nov 13, 2001||Mondex International Limited||Secure multiple application card system and process|
|US6328217||May 13, 1998||Dec 11, 2001||Mondex International Limited||Integrated circuit card with application history list|
|US6339815 *||Aug 14, 1998||Jan 15, 2002||Silicon Storage Technology, Inc.||Microcontroller system having allocation circuitry to selectively allocate and/or hide portions of a program memory address space|
|US6357665||Sep 29, 1998||Mar 19, 2002||Mondex International Limited||Configuration of IC card|
|US6385723||May 11, 1998||May 7, 2002||Mondex International Limited||Key transformation unit for an IC card|
|US6487649||Sep 13, 1999||Nov 26, 2002||Siemens Aktiengesellschaft||Microcomputer|
|US6488211||May 12, 1998||Dec 3, 2002||Mondex International Limited||System and method for flexibly loading in IC card|
|US6505279||Aug 14, 1998||Jan 7, 2003||Silicon Storage Technology, Inc.||Microcontroller system having security circuitry to selectively lock portions of a program memory address space|
|US6575372||Feb 12, 1998||Jun 10, 2003||Mondex International Limited||Secure multi-application IC card system having selective loading and deleting capability|
|US6615324||Jan 7, 2000||Sep 2, 2003||Cygnal Integrated Products, Inc.||Embedded microprocessor multi-level security system in flash memory|
|US6633984||Jan 22, 1999||Oct 14, 2003||Sun Microsystems, Inc.||Techniques for permitting access across a context barrier on a small footprint device using an entry point object|
|US6659354||Dec 21, 2001||Dec 9, 2003||Mondex International Limited||Secure multi-application IC card system having selective loading and deleting capability|
|US6693544||Jul 5, 1999||Feb 17, 2004||Deutsche Telekom Ag||Electronic identification tag|
|US6732272||Jul 31, 1997||May 4, 2004||Hitachi, Ltd.||Program writable integrated circuit card and method therefore|
|US6736325||Jan 13, 1999||May 18, 2004||Mondex International Limited||Codelets|
|US6742120||Dec 15, 1998||May 25, 2004||Mondex International Limited||System and method for controlling access to computer code in an IC card|
|US6742715||Sep 30, 2002||Jun 1, 2004||Mondex International Limited||System and method for flexibly loading an IC card|
|US6761319||Oct 30, 2001||Jul 13, 2004||Mondex International Limited||Configuration of IC card|
|US6769053||Jun 10, 1999||Jul 27, 2004||Belle Gate Investment B.V.||Arrangement storing different versions of a set of data in separate memory areas and method for updating a set of data in a memory|
|US6823520||Jan 22, 1999||Nov 23, 2004||Sun Microsystems, Inc.||Techniques for implementing security on a small footprint device using a context barrier|
|US6883716||Dec 7, 1999||Apr 26, 2005||Sun Microsystems, Inc.||Secure photo carrying identification device, as well as means and method for authenticating such an identification device|
|US6907608||Jan 22, 1999||Jun 14, 2005||Sun Microsystems, Inc.||Techniques for permitting access across a context barrier in a small footprint device using global data structures|
|US6922835||Jan 22, 1999||Jul 26, 2005||Sun Microsystems, Inc.||Techniques for permitting access across a context barrier on a small footprint device using run time environment privileges|
|US6925569||Jun 20, 2001||Aug 2, 2005||Stmicroelectronics Sa||Secured microprocessor comprising a system for allocating rights to libraries|
|US6938165||Aug 22, 2001||Aug 30, 2005||Hitachi, Ltd.||Program writable IC card and method thereof|
|US6996213||Sep 29, 1998||Feb 7, 2006||Sun Microsystems, Inc.||Superposition of data over voice|
|US7020740||Dec 6, 2000||Mar 28, 2006||Sun Microsystems, Inc.||Computer arrangement using non-refreshed DRAM|
|US7039779||Dec 20, 2000||May 2, 2006||Fujitsu Limited||Access monitor and access monitoring method for monitoring access between programs|
|US7069593||Oct 28, 1999||Jun 27, 2006||Axalto S.A.||Device and method for making secure an integrated circuit|
|US7080261||Dec 7, 1999||Jul 18, 2006||Sun Microsystems, Inc.||Computer-readable medium with microprocessor to control reading and computer arranged to communicate with such a medium|
|US7145991||Jan 9, 2004||Dec 5, 2006||Sun Microsystem, Inc.||Superposition of data over voice|
|US7162743 *||Oct 4, 2001||Jan 9, 2007||Hewlett-Packard Development Company, L.P.||System and method of limiting access to protected hardware addresses and processor instructions|
|US7185110||Apr 16, 2002||Feb 27, 2007||Sun Microsystems, Inc.||Data exchange system comprising portable data processing units|
|US7197596||Feb 2, 2006||Mar 27, 2007||Sun Microsystems, Inc.||Computer arrangement using non-refreshed DRAM|
|US7213117||Mar 14, 2001||May 1, 2007||Sharp Kabushiki Kaisha||1-chip microcomputer having controlled access to a memory and IC card using the 1-chip microcomputer|
|US7273169||Oct 19, 2004||Sep 25, 2007||Sun Microsystems, Inc.||Secure photo carrying identification device, as well as means and method for authenticating such an identification device|
|US7278029||Feb 5, 2003||Oct 2, 2007||Hitachi, Ltd.||Program writable IC card and method thereof|
|US7284106||Jul 9, 2001||Oct 16, 2007||Silicon Labs Cp, Inc.||Method and apparatus for protecting internal memory from external access|
|US7290104||Sep 19, 2001||Oct 30, 2007||Intel Corporation||Increasing code separation between applications|
|US7360039||Jun 21, 2004||Apr 15, 2008||Belle Gate Investment B.V.||Arrangements storing different versions of a set of data in separate memory areas and method for updating a set of data in a memory|
|US7363293 *||Dec 11, 2002||Apr 22, 2008||Axalto Sa||Access control method and device in an embedded system|
|US7395535||Nov 22, 2004||Jul 1, 2008||Sun Microsystems, Inc.||Techniques for permitting access across a context barrier in a small footprint device using global data structures|
|US7478389||Nov 22, 2004||Jan 13, 2009||Sun Microsystems, Inc.||Techniques for implementing security on a small footprint device using a context barrier|
|US7607175||Oct 20, 2009||Sun Microsystems, Inc.||Techniques for permitting access across a context barrier on a small footprint device using an entry point object|
|US7669055||Oct 25, 2007||Feb 23, 2010||Multos Limited||Key transformation unit for a tamper resistant module|
|US7689826||Mar 30, 2010||Multos Limited||Flexibly loading a tamper resistant module|
|US7702908||Oct 26, 2007||Apr 20, 2010||Multos Limited||Tamper resistant module certification authority|
|US7707408||Oct 25, 2007||Apr 27, 2010||Multos Limited||Key transformation unit for a tamper resistant module|
|US7725942 *||Nov 14, 2001||May 25, 2010||Gemalto Sa||Method for loading and customizing data and programmes loaded in a smart card|
|US7730310||Oct 25, 2007||Jun 1, 2010||Multos Limited||Key transformation unit for a tamper resistant module|
|US7730311||Oct 25, 2007||Jun 1, 2010||Multos Limited||Key transformation unit for a tamper resistant module|
|US7730312||Oct 26, 2007||Jun 1, 2010||Multos Limted||Tamper resistant module certification authority|
|US7734923||Mar 29, 2007||Jun 8, 2010||Multos Limited||Key transformation unit for a tamper resistant module|
|US7828218||Jul 20, 2000||Nov 9, 2010||Oracle America, Inc.||Method and system of communicating devices, and devices therefor, with protected data transfer|
|US7921287 *||Aug 13, 2002||Apr 5, 2011||Qualcomm Incorporated||Application level access privilege to a storage area on a computer device|
|US8527714 *||Nov 6, 2009||Sep 3, 2013||Sagem Defense Securite||Secure avionics equipment and associated method of making secure|
|US8554795||Nov 11, 2004||Oct 8, 2013||Legic Identsystems Ag||Method for writing data and applications into identification media|
|US9235544||Oct 4, 2010||Jan 12, 2016||Giesecke & Devrient Gmbh||Portable data carrier having additional functionality|
|US20010021966 *||Dec 20, 2000||Sep 13, 2001||Fujitsu Limited||Access monitor and access monitoring method|
|US20010052079 *||Aug 22, 2001||Dec 13, 2001||Masayuki Inoue||Program writable IC card and method thereof|
|US20020016890 *||Jun 20, 2001||Feb 7, 2002||Stmicroelectronics S.A.||Secured microprocessor comprising a system for allocating rights to libraries|
|US20020105083 *||Feb 1, 2002||Aug 8, 2002||Eic Corporation||Multi-layer interconnect module and method of interconnection|
|US20020111987 *||Apr 16, 2002||Aug 15, 2002||Belle Gate Investment B.V.||Data exchange system comprising portable data processing units|
|US20020188852 *||May 14, 2002||Dec 12, 2002||Tadakatsu Masaki||Illegal access monitoring device, IC card, and illegal access monitoring method|
|US20030054797 *||Sep 19, 2001||Mar 20, 2003||Brizek John P.||Increasing code separation between applications|
|US20030061504 *||Aug 13, 2002||Mar 27, 2003||Sprigg Stephen A.||Application level access privilege to a storage area on a computer device|
|US20030093615 *||Dec 6, 2000||May 15, 2003||De Jong Eduard Karel||Computer arrangement using non-refreshed dram|
|US20030120945 *||Feb 5, 2003||Jun 26, 2003||Masayuki Inoue||Program writable IC card and method thereof|
|US20040013266 *||Nov 14, 2001||Jan 22, 2004||Jean-Luc Giraud||Method for loading and customizing data and programmes loaded in a smart card|
|US20040146161 *||Jan 9, 2004||Jul 29, 2004||Sun Microsystems, Inc.||Superposition of data over voice|
|US20050005079 *||Dec 11, 2002||Jan 6, 2005||Alain Boudou||Access control method and device in an embedded system|
|US20050077351 *||Oct 19, 2004||Apr 14, 2005||Sun Microsystems, Inc.||Secure photo carrying identification device, as well as means and method for authenticating such an identification device|
|US20050102679 *||Nov 22, 2004||May 12, 2005||Sun Microsystems, Inc.||Techniques for permitting access across a context barrier in a small footprint device using global data structures|
|US20050193218 *||Sep 9, 2003||Sep 1, 2005||Joshua Susser||Techniques for permitting access across a context barrier on a small footprint device using an entry point object|
|US20050283579 *||Jun 21, 2004||Dec 22, 2005||Belle Gate Investment B.V.||Arrangements storing different versions of a set of data in separate memory areas and method for updating a set of data in a memory|
|US20060080497 *||Oct 4, 2005||Apr 13, 2006||Werner Boning||Program-controlled unit|
|US20060080519 *||Oct 4, 2005||Apr 13, 2006||Infineon Technologies Ag||Program-controlled unit|
|US20060090053 *||Oct 4, 2005||Apr 27, 2006||Infineon Technologies Ag||Program-controlled unit|
|US20060112246 *||Oct 4, 2005||May 25, 2006||Werner Boning||Program-controlled unit|
|US20060236026 *||Apr 15, 2005||Oct 19, 2006||Jens Hempel||Method and system for allocating, accessing and de-allocating storage space of a memory card|
|US20070112770 *||Nov 11, 2004||May 17, 2007||Legic Identsystems Ag||Method for writing data and applications into identification media|
|US20080126728 *||Oct 16, 2007||May 29, 2008||Silicon Labs Cp, Inc.||Method and apparatus for protecting internal memory from external access|
|US20110219458 *||Nov 6, 2009||Sep 8, 2011||Etienne Labarre||Secure avionics equipment and associated method of making secure|
|USRE39269||Jun 10, 2002||Sep 5, 2006||Sun Microsystems, Inc.||Data exchange system comprising portable data processing units|
|CN100447745C||Jan 20, 2000||Dec 31, 2008||太阳微系统公司||Techniques for permitting access across a context barrier on a small footprint device using on entry point object|
|CN100507797C||Jan 20, 2000||Jul 1, 2009||太阳微系统公司||Techniques for implementing security on a small footprint device using a context barrier|
|CN100559733C||Sep 19, 2002||Nov 11, 2009||英特尔公司||Increasing of code-interval between different applications|
|DE102005032542A1 *||Jul 12, 2005||Jan 18, 2007||Giesecke & Devrient Gmbh||Verwaltung von Applikationen in einem tragbaren Datenträger|
|EP0735488A1 *||Mar 29, 1996||Oct 2, 1996||Kabushiki Kaisha Toshiba||Multi-program execution controlling apparatus and method|
|EP0766211A2 *||Sep 9, 1996||Apr 2, 1997||International Business Machines Corporation||Multifunctional IC-card|
|EP0814407A1 *||Jun 19, 1996||Dec 29, 1997||Motorola, Inc.||Method and control circuit for protecting an input of an electronic circuit|
|EP0897144A2 *||Aug 10, 1998||Feb 17, 1999||Motorola, Inc.||Method and apparatus for providing access protection in an integrated circuit|
|EP1066591A1 *||Dec 4, 1998||Jan 10, 2001||Chip Application Technologies Limited||Data carrying device and systems for use therewith|
|EP1096440A1 *||Oct 26, 2000||May 2, 2001||Sagem Sa||Microprocessor carrier for storing data including a public key certificate and method for transmitting public key certificates|
|EP1113387A2 *||Dec 29, 2000||Jul 4, 2001||SCHLUMBERGER Systèmes||Smart card having a non-volatile memory with a novel mapping|
|EP1132801A2 *||Mar 9, 2001||Sep 12, 2001||Fujitsu Limited||Access monitor and access monitoring method|
|EP1139223A2 *||Mar 8, 2001||Oct 4, 2001||Nippon Telegraph and Telephone Corporation||1-chip microcomputer and ic card using same|
|EP1139223A3 *||Mar 8, 2001||Dec 7, 2005||Nippon Telegraph and Telephone Corporation||1-chip microcomputer and ic card using same|
|EP1168184A1 *||May 28, 2001||Jan 2, 2002||STMicroelectronics S.A.||Secure microprocessor including a system for allocating rights to libraries|
|EP1191423A2 *||Jun 26, 2001||Mar 27, 2002||Telesincro S.A.||Integrated circuit with cryptographic capabilities|
|EP1233382A1 *||Feb 20, 2001||Aug 21, 2002||Ellypsis Concept S.A.||Electronic element|
|EP1258807A2 *||May 9, 2002||Nov 20, 2002||Matsushita Electric Industrial Co., Ltd.||Illegal access monitoring device, ic card, and illegal access monitoring method|
|EP1450299A1 *||Nov 22, 2002||Aug 25, 2004||Dai Nippon Printing Co., Ltd.||Portable information recording medium|
|EP2482220A1 *||Jan 26, 2012||Aug 1, 2012||SafeNet, Inc.||Multi-enclave token|
|WO1998040821A1 *||Feb 5, 1998||Sep 17, 1998||Siemens Aktiengesellschaft||Microcomputer with a memory management unit|
|WO1998059325A2 *||Jun 23, 1998||Dec 30, 1998||Siemens Aktiengesellschaft||Chip card for executing non-modifiable system program routines and replacement program routines allocated thereto, and method for operating the chip card|
|WO1998059325A3 *||Jun 23, 1998||Apr 22, 1999||Siemens Ag||Chip card for executing non-modifiable system program routines and replacement program routines allocated thereto, and method for operating the chip card|
|WO2000008597A1 *||Jul 5, 1999||Feb 17, 2000||Deutsche Telekom Ag||Electronic identification tag|
|WO2000026869A1 *||Oct 28, 1999||May 11, 2000||Schlumberger Systemes||Device for and method making secure an integrated circuit|
|WO2000043875A1 *||Jan 20, 2000||Jul 27, 2000||Sun Microsystems, Inc.||Techniques for implementing security on a small footprint device using a context barrier|
|WO2000043876A1 *||Jan 20, 2000||Jul 27, 2000||Sun Microsystems, Inc.|
|WO2003025759A1||Aug 16, 2002||Mar 27, 2003||Intel Corporation||Increasing code separation between applications|
|WO2003046826A1||Nov 22, 2002||Jun 5, 2003||Dai Nippon Printing Co., Ltd.||Portable information recording medium|
|WO2003050686A1 *||Dec 11, 2002||Jun 19, 2003||Schlumberger Systemes||Access control method and device in an embedded system|
|WO2004090732A2 *||Apr 1, 2004||Oct 21, 2004||Infineon Technologies Ag||Program-controlled unit|
|WO2004090732A3 *||Apr 1, 2004||Dec 23, 2004||Infineon Technologies Ag||Program-controlled unit|
|WO2005048203A1 *||Nov 11, 2004||May 26, 2005||Legic Identsystems Ag||Method for writing data and applications into identification media|
|WO2011042387A1 *||Oct 4, 2010||Apr 14, 2011||Giesecke & Devrient Gmbh||Portable data carrier having additional functionality|
|U.S. Classification||711/115, 711/158, 711/170, 711/E12.101, 717/174, 235/382, 711/163|
|International Classification||G06F12/14, G07F7/10, G06K19/073|
|Cooperative Classification||G06F12/1441, G06Q20/35765, G07F7/1008, G06Q20/341|
|European Classification||G06Q20/35765, G06Q20/341, G06F12/14C1B, G07F7/10D|
|Feb 12, 1993||AS||Assignment|
Owner name: U.S. PHILIPS CORPORATION, NEW YORK
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST.;ASSIGNOR:BOURNAS, JEAN-PIERRE;REEL/FRAME:006409/0263
Effective date: 19930128
|Feb 25, 1999||FPAY||Fee payment|
Year of fee payment: 4
|Feb 21, 2003||FPAY||Fee payment|
Year of fee payment: 8
|Dec 15, 2006||AS||Assignment|
Owner name: NXP B.V., NETHERLANDS
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:U.S. PHILIPS CORPORATION;REEL/FRAME:018635/0755
Effective date: 20061127
|Jan 22, 2007||AS||Assignment|
Owner name: MORGAN STANLEY SENIOR FUNDING, INC., ENGLAND
Free format text: SECURITY AGREEMENT;ASSIGNOR:NXP B.V.;REEL/FRAME:018806/0201
Effective date: 20061201
|Feb 20, 2007||FPAY||Fee payment|
Year of fee payment: 12